[1]郑建忠,周世杰,王娟.基于NetFlow的动态K层特征模型库建立[J].计算机工程,2010,36(22):165-167.[2]付强,甘亮,李爱平,等.一种基于主成分分析算法的网络异常检测实现[J].南京师范大学学报,2008,8(4):13-16.[3]杨丹.网络流量异常检测方法研究及仿真平台研制[D].成都:电子科技大学,2008.[4]LAKHINA A,CROVELLA M,DIOT C.Mining anomalies using traffic feature distributions[C]// Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York:ACM press,2005,35(4):9-20.[5]杜洪毅,基于Netflow的网络异常流量发现的研究与实现[D].成都:电子科技大学,2010.[6]ZHANG HONGZHUO,Study on the TOPN abnormal detection based on the NetFlow data set[J]. Computer and Information Science,2009,2(3):103-108.[7]王志.基于Netflow的流量统计分析系统设计与实现[D].北京:北京邮电大学,2007.[8]戚玉娥.基于网络流的流量异常检测研究[D].济南:山东师范大学,2009.[9]肖志新,杨岳湘,杨霖.一个基于NetFlow的异常流量检测与防护系统[J].微电子学与计算机,2006,23(5):209-210,213.[10]叶润国,胡建平.基于主机活跃性和通信模式分析的实时异常检测[C]// 2007年全国网络与信息安全技术研讨会论文集.青岛:[出版者不详],2007:35-41.[11]蒲天银,秦拯.基于NetFlow的流量异常检测技术研究[J].计算机与数字工程,2009,37(7):115-118.[12]朱敏.基于NetFlow的网络流量异常的分析[J].计算机系统应用,2006,15(4):28-30.[13]李韦韦,多层特征分配网络入侵检测系统[D].南昌:南昌大学,2007.[14]CORMODE G, MUTHUKRISHNAN S.What's new:Finding significant differences in network data streams[C]// Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. Washington, DC: IEEE Computer Society,2004,3: 1534-1545.[15]CROVELLA M E, TAQQU M S,BESTAVROS A.Heavy-tailedprobability distributions in the world wide Web[C]// Practical Guide To Heavy Tails: Statistical Techniques And Applications.Cambridge,MA,USA:Birkhauser Boston,1998(1):3-25.[16]DANIEL K, SHAI B D, JOHANNES G.Detecting change in data streams[C]// Proceedings of the Thirtieth International Conference on Very Large Data Bases. New York:ACM,2004, 30:180-191. |